Analysis

  • max time kernel
    142s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-04-2024 06:44

General

  • Target

    f9bb522ae0a4aa47a6d94bc99e215bb6_JaffaCakes118.exe

  • Size

    1.8MB

  • MD5

    f9bb522ae0a4aa47a6d94bc99e215bb6

  • SHA1

    665c41342fa5b963bb29fc78b27fd6798ceb3f4f

  • SHA256

    1013ad1290523f5417ed789d11900f8ae804c0d81ed60af75684039fb06223b8

  • SHA512

    6a16c60bb872ddfca4d522bd87ebee7010a135287923081a7bf93c3bd3e0805353c241f13634c86523a8e19958a4dd63c81bbbfa63b6a7ec33f67b949415ef8d

  • SSDEEP

    49152:pJ2G79v/xSHzBJ6WC+j2bpW+6Q4GIPs7eBl3au:pJ2G7J/xSKWmbp9F4Gr

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Themida packer 3 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 32 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f9bb522ae0a4aa47a6d94bc99e215bb6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f9bb522ae0a4aa47a6d94bc99e215bb6_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1348
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\Mayoko110.msi"
      2⤵
      • Enumerates connected drives
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:2876
    • C:\Users\Admin\AppData\Local\Temp\MINE.exe
      "C:\Users\Admin\AppData\Local\Temp\MINE.exe"
      2⤵
      • Executes dropped EXE
      • Identifies Wine through registry keys
      PID:1288
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3856
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1420 --field-trial-handle=3240,i,13319578961094268484,16557498665191861597,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:940

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Defense Evasion

    Virtualization/Sandbox Evasion

    1
    T1497

    Discovery

    Query Registry

    3
    T1012

    System Information Discovery

    3
    T1082

    Virtualization/Sandbox Evasion

    1
    T1497

    Peripheral Device Discovery

    1
    T1120

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\MINE.exe
      Filesize

      1.4MB

      MD5

      9c0595fe4367e61e2e578ef6fa5e3d0f

      SHA1

      99a64947b86b69e2dda873076e18433a63338729

      SHA256

      60591d011a090da281ada86b6b9d505e7faa491ce23304b74f7e243a973d5714

      SHA512

      898712fa3192ccdfbb0346119357bada0839d58d095c18099ac839778b10eb13372618bf0ad0187b4a4526f95a6058bb5bbcd137046bbfb7ef19c60fa0417c85

    • C:\Users\Admin\AppData\Local\Temp\Mayoko110.msi
      Filesize

      331KB

      MD5

      c6b2b9d56db7b703f815cfb6c3afe15f

      SHA1

      755374a9e93762d5cc954b9ac8b7806b0350f5e9

      SHA256

      f5d26026febd4fb52b651fd2cb0677289a32db2dda7a76fa161a0f72f3e1f7b4

      SHA512

      a1e92ff0aec339275747f86c6261a2e78bd4511b406fd90e22e8514a76bf161c4758135e2142ccc472e4d4d04c9911853d17e27272c6c389e9bea6c01debcdd7

    • memory/1288-15-0x0000000000400000-0x00000000007D4000-memory.dmp
      Filesize

      3.8MB

    • memory/1288-16-0x00000000022F0000-0x00000000023EF000-memory.dmp
      Filesize

      1020KB

    • memory/1288-17-0x00000000023F0000-0x00000000023F1000-memory.dmp
      Filesize

      4KB

    • memory/1288-19-0x0000000000400000-0x00000000007D4000-memory.dmp
      Filesize

      3.8MB

    • memory/1288-20-0x00000000023F0000-0x00000000023F1000-memory.dmp
      Filesize

      4KB

    • memory/1348-0-0x0000000000400000-0x0000000000412000-memory.dmp
      Filesize

      72KB

    • memory/1348-14-0x0000000000400000-0x0000000000412000-memory.dmp
      Filesize

      72KB